Configuring the Requested AuthN Context Authentication Selector
The Requested AuthN Context Authentication Selector enables PingFederate to choose configured authentication sources or other selectors.
About this task
This selector chooses authentication sources or selectors based on the authentication contexts requested by a service provider (SP) for browser single sign-on (SSO) requests, or a relying party (RP) for OAuth with OpenID Connect use cases in authentication policies.
For browser SSO, this authentication selector works in conjunction with SP connections with SAML 2.0 only, using the SP-initiated SSO profile. Other browser SSO protocols do not support authentication context. For OAuth, clients supporting the OpenID Connect protocol must include the optional acr_values
parameter in their authorization requests to indicate their preferred authentication context, or contexts.
Steps
-
Go to Authentication → Policies → Selectors to open the Selectors window.
-
On the Selectors window, click Create New Instance to start the Create Authentication Selector Instance workflow.
-
On the Type tab, configure the basics of this authentication selector instance.
-
On the Authentication Selector tab, configure the applicable selector instance settings.
-
Select the Add or Update AuthN Context Attribute check box if you want to update the authentication context attribute value with the value specified in the Selector Result Values tab.
Result:
When selected, which is the default, the check box on this window provides a means to:
-
Add the value of the authentication context determined by the selector into the SAML assertion.
-
When applicable, replace any value returned from the associated adapter instance with the selector-result value.
-
-
Optional: Enable policy paths to handle additional scenarios.
For more information, refer to the following table.
Field Description Enable 'No Match' Result Value
Selector evaluation fails and the next applicable authentication policy is executed if the requested authentication context does not match any of the configured selector result values.
Select this check box if you want to enable a policy path to handle this scenario. This check box is not selected by default.
Enable 'Not in Request' Result Value
Selector evaluation fails and the next applicable authentication policy is executed if no requested authentication context is found.
Select this check box if you want to enable a policy path to handle this scenario. This check box is not selected by default.
-
-
On the Selector Result Values window, specify the authentication contexts to use as the criteria.
-
Enter the exact, case-sensitive parameter value under Result Values, and then click Add.
The value can include URIs defined in Authentication Context for the OASIS Security Assertion Markup Language (SAML) 2.0 or any other value agreed upon with the partner.
-
Optional: Add more values to differentiate criteria for authentication selection.
Display order does not matter.
Each selector result value forms a policy path when you place this selector instance as a checkpoint in an authentication policy (regardless of whether you have enabled the No Match or Not in Request policy path in step 4b).
Use the Edit, Update, and Cancel workflow to make or undo a change to an existing entry. Click Delete to remove an entry.
-
-
Complete the configuration. On the Summary tab, click Done. On the Selectors window, click Save.